Friday, 9 March 2018

Traditionally, Microsoft SQL Server, being part of Microsoft’s back office platform, has always run on Windows operating systems. However, Microsoft has made a commitment to enable customers to choose any platform. As part of this commitment, for SQL Server 2017,

The requirement was to Secure Remote Access to Server in a private cloud infrastructure, where the customer wanted to provide RDP of Microsoft Windows Server with different RDP port other than the default one which shipped with default Windows installation.

Monday, 5 March 2018

The recent years have witnessed a distinct and
consistent escalation in cyberattacks’ scope, scale, and
sophistication, impacting organizations across all verticals and
locations. This escalation is manifested not only in increasing
proliferation of threat-actor groups, but also in the diversity of the
utilized attack Tools Techniques and Procedures (TTPs), ranging from
zero-day exploits to weaponized antimalware and publicly available
toolkits.

This threat landscape is driving a change in the common security
paradigm, bringing security stakeholders to realize that a resourceful
and determined attacker will at a certain point succeed in bypassing the
traditional prevention and detection controls.

To proactively respond to these threats, there
is a need for a security layer that operates following the successful
bypass of these controls and is tasked with detecting the malicious
activity consecutive to this bypass.

Active Directory is one of the most widely used services on enterprise networks. In addition to providing basic authentication and authorization services, Active Directory enables so many other capabilities that its popularity is no surprise.

Most of the people are still running Windows Server 2008 in the network and wants to safely migrate to Windows Server 2012 R2 edition. Windows Server 2012 R2 adds some significant new features to both Active Directory Domain Services (AD DS).

Make no mistake: over the last few years, we’ve seen faster acceleration
of government organizations moving to the cloud. So why now? This move
is driven largely by the desire to bring the most up-to-date tools and
capabilities to employees to meet demands for mobility and create a more
modern workplace—and to ensure they are better equipped to face rising
security challenges. And this desire is supported by recent legislation
like the Modernizing Government.Technology Act, which creates IT
modernization funds to help agencies replace aging infrastructure that
poses security risks.